Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Data Analysis
Computer Science
Financial Markets
CS50's Introduction to Computer Science
Functional Foods and Nutraceuticals
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from DefCamp. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore common mistakes in cybersecurity, including blue team, red team, and community failures. Learn valuable lessons to improve your security practices and strategies.
Explore the evolution of cybersecurity, from its origins to future trends. Gain insights into industry transformations, fundraising, acquisitions, and emerging patterns in information security.
Explore mobile cryptocoin wallet security, focusing on usability, current applications, and potential improvements. Learn about secure enclaves, key pairs, and transaction signing for enhanced protection.
Explore browser instrumentation techniques for analyzing exploit kits, with demonstrations and practical advice for enhancing web security and preventing payload execution.
Explore legal challenges in cybersecurity, including data protection laws, penetration testing contracts, and law enforcement interactions. Learn to navigate legal complexities in the infosec field.
Explore threat intelligence transformation into actionable data using innovative techniques like honeypots, passive DNS, and graph-based models for enhanced cybersecurity analysis and decision-making.
Explore Tinder's privacy, profile building, and bot vulnerabilities in this DefCamp talk on dating app security risks and potential exploits.
Explore hacking's impact on shaping actions, from hype to practical applications. Gain insights into cybersecurity challenges, collaborations, and the future of information security.
Explore IoT hacking and CTF challenges in this DefCamp talk. Gain insights into IoT security, Brillo, and router vulnerabilities for enhanced cybersecurity knowledge.
Explore steganography's evolution, from classic techniques to modern applications in data science and Android. Learn about hidden data in images, banking malware, and emerging threats.
Explore nation-state malware targeting telco networks, covering network architecture, interfaces, service enumeration, and core GPRS networks. Gain insights into cybersecurity threats in telecommunications.
Exploración práctica de técnicas de hacking y seguridad informática, destacando vulnerabilidades comunes y la importancia de la concienciación en ciberseguridad.
Explore the challenges, objectives, and key success factors in establishing a Cyber Security Operations Center. Learn about data aggregation, change management, and incident response strategies.
Explore IDS evasion techniques, network vulnerabilities, and potential solutions in this comprehensive overview of cybersecurity challenges and defensive strategies.
Explora los desafÃos y soluciones de seguridad en el Internet de las Cosas, comparando dispositivos y demostrando vulnerabilidades en esta charla de DefCamp sobre ciberseguridad.
Get personalized course recommendations, track subjects and courses with reminders, and more.